Skip to content

Commit

Permalink
Adding note to security events section on not using the catch-all cha…
Browse files Browse the repository at this point in the history
…racter when adding a whitelist rule as unexpected processes could be flagged causing process violations. Tied to NVSHAS-8911.

Signed-off-by: Sunil Singh <[email protected]>
  • Loading branch information
sunilarjun committed Jan 14, 2025
1 parent 128327b commit 5640ff8
Show file tree
Hide file tree
Showing 4 changed files with 16 additions and 0 deletions.
4 changes: 4 additions & 0 deletions docs/07.reporting/01.reporting/01.reporting.md
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,10 @@ Violations are connections that violate the whitelist Rules or match a blacklist

In this view, you can review network, process, and file events and easily add a whitelist rule for false positives by clicking the Review Rule button. The Advanced Filter enables you to select the type of event to display.

:::important
When adding a whitelist rule, please be explicit in the network, process or file event addition (e.g. `("sshd", "/usr/sbin/sshd")`). Do not use the character `(*)` when adding a rule as it may add unexpected processes which could be flagged as process violations.
:::

![AddRule](security_events_addrule.png)

NeuVector also continuously monitors all containers for know attacks such as DNS, DDoS, HTTP-smuggling, tunneling etc. When an attack is detected it is logged here and blocked (if container/service is set to protect), and the packet is automatically captured. You can view the packet details, for example:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,10 @@ Violations are connections that violate the whitelist Rules or match a blacklist

In this view, you can review network, process, and file events and easily add a whitelist rule for false positives by clicking the Review Rule button. The Advanced Filter enables you to select the type of event to display.

:::important
When adding a whitelist rule, please be explicit in the network, process or file event addition (e.g. `("sshd", "/usr/sbin/sshd")`). Do not use the character `(*)` when adding a rule as it may add unexpected processes which could be flagged as process violations.
:::

![AddRule](security_events_addrule.png)

NeuVector also continuously monitors all containers for know attacks such as DNS, DDoS, HTTP-smuggling, tunneling etc. When an attack is detected it is logged here and blocked (if container/service is set to protect), and the packet is automatically captured. You can view the packet details, for example:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,10 @@ Violations are connections that violate the whitelist Rules or match a blacklist

In this view, you can review network, process, and file events and easily add a whitelist rule for false positives by clicking the Review Rule button. The Advanced Filter enables you to select the type of event to display.

:::important
When adding a whitelist rule, please be explicit in the network, process or file event addition (e.g. `("sshd", "/usr/sbin/sshd")`). Do not use the character `(*)` when adding a rule as it may add unexpected processes which could be flagged as process violations.
:::

![AddRule](security_events_addrule.png)

NeuVector also continuously monitors all containers for know attacks such as DNS, DDoS, HTTP-smuggling, tunneling etc. When an attack is detected it is logged here and blocked (if container/service is set to protect), and the packet is automatically captured. You can view the packet details, for example:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -99,6 +99,10 @@ Violations are connections that violate the whitelist Rules or match a blacklist

In this view, you can review network, process, and file events and easily add a whitelist rule for false positives by clicking the Review Rule button. The Advanced Filter enables you to select the type of event to display.

:::important
When adding a whitelist rule, please be explicit in the network, process or file event addition (e.g. `("sshd", "/usr/sbin/sshd")`). Do not use the character `(*)` when adding a rule as it may add unexpected processes which could be flagged as process violations.
:::

![AddRule](security_events_addrule.png)

NeuVector also continuously monitors all containers for know attacks such as DNS, DDoS, HTTP-smuggling, tunneling etc. When an attack is detected it is logged here and blocked (if container/service is set to protect), and the packet is automatically captured. You can view the packet details, for example:
Expand Down

0 comments on commit 5640ff8

Please sign in to comment.